Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 22:22

General

  • Target

    ea86ddc82eaf1fe12859a8a78d9e1a66d34fe966e52a21983fecdc31b16accceN.exe

  • Size

    8.2MB

  • MD5

    3fa94990eee5869f44570dc713560910

  • SHA1

    1ceb6315ac256cef0c5a8c2a310ef6d632760030

  • SHA256

    ea86ddc82eaf1fe12859a8a78d9e1a66d34fe966e52a21983fecdc31b16accce

  • SHA512

    83a595e5d921d73a7b47e489e9ee9da987956b323d90c25e6363b5151b16d3cc0f4cec2d244f5a003d48246d3d93e0fea6e5e4c4d1a2d8a1c8588bd76fd9ec56

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNeca:V8e8e8f8e8e8n

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 7 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 51 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea86ddc82eaf1fe12859a8a78d9e1a66d34fe966e52a21983fecdc31b16accceN.exe
    "C:\Users\Admin\AppData\Local\Temp\ea86ddc82eaf1fe12859a8a78d9e1a66d34fe966e52a21983fecdc31b16accceN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\AppData\Local\Temp\ea86ddc82eaf1fe12859a8a78d9e1a66d34fe966e52a21983fecdc31b16accceN.exe
      "C:\Users\Admin\AppData\Local\Temp\ea86ddc82eaf1fe12859a8a78d9e1a66d34fe966e52a21983fecdc31b16accceN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2776
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1292
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2860
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2380
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:300
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:700
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1232
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:644
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1536
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2920
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:316
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2176
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2948
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2244
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 36
              6⤵
              • Program crash
              PID:2328
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:1972
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        3fa94990eee5869f44570dc713560910

        SHA1

        1ceb6315ac256cef0c5a8c2a310ef6d632760030

        SHA256

        ea86ddc82eaf1fe12859a8a78d9e1a66d34fe966e52a21983fecdc31b16accce

        SHA512

        83a595e5d921d73a7b47e489e9ee9da987956b323d90c25e6363b5151b16d3cc0f4cec2d244f5a003d48246d3d93e0fea6e5e4c4d1a2d8a1c8588bd76fd9ec56

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        598c848e7c7d7b3ec1c87206cb49ae45

        SHA1

        4f2b6ba96b74be871582748c07e35b68c3b6874f

        SHA256

        a0925a8cf31345329cd938f3c375c927fb88c7dfb34ad531022739888b7826a2

        SHA512

        7e36b3025af8d784fce1df6062b8488d93541393017c0bda90175ab2c7419081b9bf9224243e78f674651f4132acf7c93fdd2d490f0f68d66b503695b94288c8

      • C:\Windows\system\spoolsv.exe

        Filesize

        6.9MB

        MD5

        e6e55182571babeb21fd89113cf42ace

        SHA1

        9828fd7bd5747ecd142280006c30df66b29c0c39

        SHA256

        8265066e82ad16534591b34fcfa5f7ccb92d1bac5fcc211cf8916f85e4d7563d

        SHA512

        2854b396979fcbf2f8fa5e1db541ab0313e489dfea58385facd3b451baf886721210335e1babaec57cc846f1ee94a7845e566e447ad715485607de3675bc896d

      • \Windows\system\spoolsv.exe

        Filesize

        7.9MB

        MD5

        28d7d52c13bba9900bc0766ef4ab2feb

        SHA1

        079ce25105068f151fb97dfffedf7637bedccb09

        SHA256

        0085f06bfb65158bfb3de03b3de58eff84081b6adf9d53edd4db9d9d7a3d16d3

        SHA512

        a59e26cce538d62cdbc7fb3db86bb035c7a3c28d4c22ca7d41f72c823969214aaf91847deaf96cfd782a11450bb541a658b7036407152cc26540b47799a4a3d2

      • \Windows\system\spoolsv.exe

        Filesize

        7.0MB

        MD5

        84273f34ceb1a2f6a4abd0ff92dce6eb

        SHA1

        eeb68063382da32898556cf1f2c5f0360575bd87

        SHA256

        c4fcee8aecee09530087fd4ab3b99ff04b3c93f185e0f0b765f4ca09b7ebed4b

        SHA512

        bc631ad2b5b061133c5c1b47662c49e1acc9007756739e7f78cdd583e6433a9401d7e4c6bcbd1ec664c4cf63355f2bfb19dacbf6208bc6620b517b7edd16648f

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        ec553d6bbcfc0810ab70933355747666

        SHA1

        d3cf924078e0e36d72f96dc1671a578797e1af9f

        SHA256

        1c84f7eea47d7a65c4651c0fbab634e2a5c6a12d539432ad26f75e12915fb9a8

        SHA512

        38535491791b4b5ebec5286b3cf6c5f3a62f169679663416ea5c310a0636d34a559278e895ece93d36ee0cd6f86d68deb6fde16ab0b14d025886a322db70e94d

      • memory/540-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/540-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/540-39-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/540-6-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/540-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/540-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/540-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/540-24-0x00000000031B0000-0x00000000032C4000-memory.dmp

        Filesize

        1.1MB

      • memory/644-155-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/700-136-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1292-134-0x0000000003150000-0x0000000003264000-memory.dmp

        Filesize

        1.1MB

      • memory/1292-125-0x0000000003150000-0x0000000003264000-memory.dmp

        Filesize

        1.1MB

      • memory/1292-153-0x0000000003150000-0x0000000003264000-memory.dmp

        Filesize

        1.1MB

      • memory/1292-124-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1292-115-0x0000000003150000-0x0000000003264000-memory.dmp

        Filesize

        1.1MB

      • memory/1292-101-0x0000000003150000-0x0000000003264000-memory.dmp

        Filesize

        1.1MB

      • memory/1292-143-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1292-205-0x0000000003150000-0x0000000003264000-memory.dmp

        Filesize

        1.1MB

      • memory/2380-116-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2744-56-0x0000000000440000-0x000000000051F000-memory.dmp

        Filesize

        892KB

      • memory/2744-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2744-58-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2744-26-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2744-49-0x00000000031F0000-0x0000000003304000-memory.dmp

        Filesize

        1.1MB

      • memory/2744-18-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2744-50-0x00000000031F0000-0x0000000003304000-memory.dmp

        Filesize

        1.1MB

      • memory/2744-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2744-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2776-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2776-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2776-55-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2776-88-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2776-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2784-37-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2784-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2784-33-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2784-30-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2784-40-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2860-133-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2860-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2860-104-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2860-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2920-172-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB